Login | Register   
LinkedIn
Google+
Twitter
RSS Feed
Download our iPhone app
TODAY'S HEADLINES  |   ARTICLE ARCHIVE  |   FORUMS  |   TIP BANK
Browse DevX
Sign up for e-mail newsletters from DevX


advertisement
Search the Tips
Tip Bank > Security

Security

Authentication
Encryption
Java
Password Management
SQL Server
Systems Administration
Visual Basic
1-20 of 5161     Previous     Next
Get a User that has Deleted Rows with SQL
by Hannes du Preez
Language: SQL, Expertise: Intermediate - Finding a user who has deleted rows is a multi-part process. Get some tips on how to get it done.
Making a File Read-only Using Java
by M S Sridhar
Language: Java, Expertise: Intermediate - Explore how the setReadOnly() method works in Java.
Performing Basic Validation with the Error Provider Control in C#
by Hannes du Preez
Language: .NET, Expertise: Beginner - See why the ErrorProvider control is quite useful when it comes to user input validation.
Tools that Highlight the Performance of the W3af Web Application Security Scanner
by Octavia Anghel
Language: Web, Expertise: Intermediate - Explore the most useful tools that work in association with the w3af web application security scanner.
Getting the Everyone Local Group Account Name in C#
by Hannes du Preez
Language: .NET, Expertise: Intermediate - See how easy it is to get the "Everyone" account name, with the help of the DirectorySecurity and SecurityIdentifier classes.
View the Certificate of a Website in Chrome
by Srinath M S
Language: Web, Expertise: Beginner - Learn how to easily view the certificate of a website in Chrome
Capturing Textboxes Available in a Google Authentification Page Using Selenium
by Octavia Anghel
Language: IDEs, Expertise: Intermediate - Learn how to retrieve a list of textboxes available in a Google authentication page.
Making a Java List Thread Safe
by M S Sridhar
Language: Java, Expertise: Intermediate — The java.util.list is not thread safe by default. Learn a quick workaround to make your list thread safe.
Encrypt a Config Section Using .NET's Configuration Providers
by Srinath M S
Language: .NET, Expertise: Advanced — Learn to encrypt a config section using .Net's configuration providers.
Spring Admin Expiring all Session of a Certain User
by Octavia Anghel
Language: Web, Expertise: Intermediate — Learn how to expire the sessions of a particular user.
Generate Random Passwords
by Srinath M S
Language: .NET||Expertise: Beginner
Determine What Permissions the User Has on the System
by Hannes du Preez
Language: .NET||Expertise: Beginner
Locking Your Computer with C#
by Hannes du Preez
Language: .NET||Expertise: Intermediate
Dealing with Windows File Security Permission Rules for Copying Remote Files
by Boris Eligulashvili
This article presents a programmatic solution to the problem based on adding permissions to the files.
JSF Backing Bean Tips: Parameter Extractions and Redirects
by Leonard Anghel
These two quick JSF bean backing tips show how to extract request parameters and redirect page loads.
Java Code to Filter File Names in a Directory
by deniz mermerci
Using this Java code snippet, you can filter file names for array of extensions, split the file names, and test the resulting array.
Managed Classes and Object Injection in Java EE 5
by Anghel Leonard
Get a quick reference for what types of managed class can inject what object in Java EE 5.
Managing Concurrent Requests with EJB Containers
by Anghel Leonard
A limitation of EJB containers is that they can't serialize complex objects. Find out how the PrePassivate and PostActivate methods overcome this shortcoming.
Using EJB Interceptors for Java EE Audits
by Leonard Anghel
With EJB interceptors, you can access the name, parameters, and EJB context of business methods.
How to Read Environment Variables in SQL Server Using T-SQL
by Deepak Choudhari
The xp_cmdshell extended stored procedure in SQL Server enables you to read environment variables in T-SQL.
1-20 of 5161     Previous     Next
Sitemap
Thanks for your registration, follow us on our social networks to keep up-to-date